Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP application
Firewalls (Computer security) --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer networks --- Information Technology --- General and Others
Choose an application
Dr. Tom Shinders ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. * Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006. * Learn to Publish Exchange Server 2007 Using ISA Server 2006. * Create a DMZ using ISA Server 2006. * Dr. Tom Shinders previous two books on configuring ISA Server have sold more than 50,000 units worldwide. * Dr. Tom Shinder is a Microsoft Most Valuable Professional (MVP) for ISA Server and a member of the ISA Server beta testing team. * This book will be the Featured Product on the Internets most popular ISA Server site www.isaserver.org.
Choose an application
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows ""security book."" I
Monograph --- Client/server computing. --- Web servers. --- Servers, Web --- Webservers --- World Wide Web servers --- WWW servers --- Client/server computing --- Cookies (Computer science) --- Web hosting --- Computing, Client/server --- Electronic data processing --- Equipment and supplies --- Distributed processing
Choose an application
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books tw
Computer networks --- Computer security. --- Security measures.
Choose an application
This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ,
Firewalls (Computer security) --- Computer networks --- Security measures.
Choose an application
Syngress Study Guides guarantee comprehensive coverage of all exam objectives. There are no longer any short cuts or gimmicks that allow candidates to pass Microsoft's new, more rigorous exams. The days of cramming to become a "paper MCSE" are over; candidates must have a full grasp of all core concepts and plenty of hands-on experience to become certified. This book provides complete coverage of Microsoft Exam 70-291 and features one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, this study guide & DVD training system gives students 100% coverage of official Microsoft exam objectives plus realistic test prep. The System package consists of: 1) STUDY GUIDE. 800 pages of coverage explicitly organized in the identical structure of Microsoft's exam objectives. Sections are designed to "standalone", allowing readers to focus on those areas in which they are weakest and skim topics they may have already mastered. 2) DVD: A full hour of instructor-led training, complete with on-screen configurations and networking schematics, demystifying the toughest exam topics. 3) ONLINE PRACTICE EXAMS AND E-BOOK. Most exam candidates indicate that PRACTICE EXAMS are their single most valuable exam prep tool. Buyers of our Study Guides have immediate access to our exam simulations located at WWW.SYNGRESS.COM/SOLUTIONS. Syngress practice exams are highly regarded for rigor or the questions, the extensive explanation of the right AND wrong answers, and the direct hyperlinks from the exams to appropriate sections in the e-book for remediation. Readers will be fully prepared to pass the exam based on our 100% Certified guarantee. Readers may save thousands of dollars required to purchase alternative methods of exam preparation. Because of its breadth of coverage, this book will serve as a post-certification reference for IT professionals.
Choose an application
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft
Computer security. --- Operating systems (Computers). --- Operating systems (Computers) --- Microsoft Windows server. --- Information Technology --- General and Others --- Computer networks --- Database security. --- Security measures. --- Data base security --- Databases --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection --- Windows server --- Microsoft Windows 2000 server --- Windows server 2003 --- Windows Home Server --- Microsoft Windows Home Server --- Microsoft Windows NT server --- Computer operating systems --- Disk operating systems --- Systems software --- Operating systems
Choose an application
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.* Learn to Publish Exchange
Firewalls (Computer security) --- Internet --- Systems migration. --- Security measures. --- Microsoft ISA server. --- Information systems migration --- Migration, Systems --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- ISA server --- Systems engineering --- Computer networks --- Security measures --- Information Technology --- General and Others
Choose an application
Microsoft's flagship ISA Server delivers the Internet to your customers!As the demand for Internet connectivity reaches a fever pitch, system administrators are being challenged to connect more and more systems to the Internet without compromising security or network performance. ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and speed.Written by best-selling author of several MCSE 2000 study guides, this book will provide the system administrators
Choose an application
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product ""Configuring ISA Server 2000"" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.<
Firewalls (Computer security) --- Computer security. --- Computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Security measures. --- Protection --- Security measures --- Microsoft ISA server. --- ISA server
Listing 1 - 10 of 18 | << page >> |
Sort by
|